9. Understanding Copy Protection

TODO: Not sure where to put this (perhaps in the intro? Different goals of
reverse engineering? or perhaps as a part of the next section?) In any
case, it should describe common methods to copy protection, and how it
basically boils down to a conditional check in your program (with possible
a little decryption). Basically it comes down to chosing betwen presenting
techniques and then discussing how to use therm, or first discussing how we can
us the techniques we are about to discuss.. Which is better?